Results for Threat

ThreatX Adds API Visibility, Protection Capabilities To Defend Against Real-Time Attacks

To provide deep security of APIs and real-time insights into API attacks, ThreatX is enhancing its API protection platform with API schema compliance and dashboard features.

Full Story >

Deep Instinct Threat Report Says Attacks More Numerous, More Evasive

Cyberattacks remain over double pre-pandemic levels, according to a new report from Deep Instinct. Perhaps even more troubling, attacks are focusing on new targets, including AI/ML protections.

Full Story >

Accurics Enhances Developer-First View of Cloud Security with Channel Program

Accurics is launching a partner program to develop a rich ecosystem around protecting and securing Infrastructure as Code initiatives. IDN reviews the program and looks at early participants.

Full Story >

Gurucul XDR Uses Machine Learning & Integration for Real-Time Threat Detection, Incident Response

To improve speed and intelligence of threat detection and response, Gurucul’s cloud-native XDR platform is adding machine learning, integration risk scoring and more.

Full Story >

Druva Delivers SaaS-Based Data Protection for Kubernetes

Druva is introducing a cloud-based SaaS solution to offer users simplified, enterprise-grade backup and disaster recovery support for Kubernetes. It also protects on-prem data centers and cloud workloads via a unified interface.

Full Story >

F5 Updates End-to-End App Security with Optimized AI and Broadened Portfolio

F5 is bringing AI and machine learning to the tricky job of balancing app performance with security and protection.  F5’s latest app-centric security rollout now sports technology from recently acquired Shape Security.

Full Story >

FireEye Extends Security, Intelligence to Cloud, Hybrid Environments

FireEye is rolling out a set of technologies that aim to deliver enhanced security and intelligence to detect threats to the cloud and hybrid environments. IDN takes a look at the FireEye Cloud Security Solution and other cloud-centric offerings.

Full Story >

Survey: Cloud-Centered Digital Transformation Efforts Can Boost Risk of Identity-Related Attacks

An eye-opening survey of enterprise IT professionals reveals that some digital transformation efforts may increase the risk of hacks and identity-driven attacks. IDN looks at the study from CyberArk that suggests the pursuit of agility and automation can compromise well-established security.

Full Story >

Growing CyberSecurity Skills Gap Worries Security Professionals; Highlights Challenges for Staffing

A recent survey on security staff confirms what we all know – IT is growing even more worried that these professionals are so hard to find, hire and keep.  But the survey, commissioned by Tripwire, also found the shortage is prompting companies to their methods for how to protect against cyberattacks. 

Full Story >

Splunk Continues To Expand Its Adaptive Response Initiative To Detect, Battle CyberThreats Faster

As cyber threats become more sophisticated, headline-grabbing security point solutions just can’t handle the speed and complexity of diagnosing and fighting off the attacks.  In response, Splunk continues to recruit vendor partners and domain experts to its Adaptive Response Initiative. IDN looks at the latest additions.

Full Story >

<< Start < Previous 1 Next > End >>
Showing 1 - 10 of 10

Videos

Security Threats, Frameworks and Mitigation Efforts



  • Peter Allor
    Security Strategist